Context-sensitive control over attentional orienting

被引:0
|
作者
Milliken, Bruce [1 ]
Crump, Matthew [2 ]
机构
[1] McMaster Univ, Dept Psychol, Hamilton, ON, Canada
[2] Vanderbilt Univ, Dept Psychol, Nashville, TN 37240 USA
关键词
D O I
暂无
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
引用
收藏
页码:353 / 353
页数:1
相关论文
共 50 条
  • [31] Competition for Context-Sensitive Consumers
    Apffelstaedt, Arno
    Mechtenberg, Lydia
    MANAGEMENT SCIENCE, 2021, 67 (05) : 2828 - 2844
  • [32] Dynamic Context-Sensitive Deliberation
    Jensen, Maarten
    Vanhee, Lois
    Dignum, Frank
    MULTI-AGENT-BASED SIMULATION XXIV, MABS 2023, 2024, 14558 : 112 - 126
  • [33] USING A CONTEXT-SENSITIVE LEARNING NETWORK FOR ROBOT ARM CONTROL
    YEUNG, DY
    GEKEY, GA
    PROCEEDINGS - 1989 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOL 1-3, 1989, : 1441 - 1447
  • [34] Context-Sensitive Document Ranking
    常利军
    于旭
    秦璐
    Journal of Computer Science & Technology, 2010, 25 (03) : 444 - 457
  • [35] Practical Context-Sensitive CFI
    van der Veen, Victor
    Andriesse, Dennis
    Goktas, Enes
    Gras, Ben
    Sambuc, Lionel
    Slowinska, Asia
    Bos, Herbert
    Giuffrida, Cristiano
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 927 - 940
  • [36] Context-sensitive query expansion
    Li, Weijiang
    Zhao, Tiejun
    Wang, Xiangang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (02): : 300 - 304
  • [37] THE CENTERS OF CONTEXT-SENSITIVE LANGUAGES
    STAIGER, L
    NEHRLICH, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 233 : 594 - 601
  • [38] Secure context-sensitive authorization
    Minami, K
    Kotz, D
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 257 - 268
  • [39] Secure context-sensitive authorization
    Minami, Kazuhiro
    Kotz, David
    PERVASIVE AND MOBILE COMPUTING, 2005, 1 (01) : 123 - 156
  • [40] ON GROWING CONTEXT-SENSITIVE LANGUAGES
    BUNTROCK, G
    LORYS, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 623 : 77 - 88